Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
LOIS, IPSJ-CN, IPSJ-SPT |
2015-05-15 14:00 |
Tokyo |
Tsuda College, Kodaira Campus |
Risk Assessment of Privacy Disclosure in Facebook Use
-- Privacy Setting and Awareness of the Young Members in Society -- Yoshiaki Seki, Sumire Hirota, Mizuki Yamazaki (Tokyo City Univ.) LOIS2015-7 |
Facebook is gathering many users as a place of the communication between the friends. On the other hand, unexpected priv... [more] |
LOIS2015-7 pp.85-90 |
SSS |
2014-08-28 14:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
A study of safety design based on precautionary principle Kohei Okabe, Kyoko Hamajima, Yoshihiko Sato (JNIOSH) SSS2014-15 |
An application of precautionary principle for safety design of machinery is discussed in this paper. General safety desi... [more] |
SSS2014-15 pp.11-14 |
SSS |
2014-06-26 14:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Popularization of ISO 11161 and the related issues
-- A case study -- Yukihiro Imaeda, Tetsuya Kimura (Nagaoka Univ. of Tech.) SSS2014-9 |
Integrated Manufacturing System (IMS) occupies an important position in the manufacturing industry along with the facili... [more] |
SSS2014-9 pp.9-12 |
ICSS, IPSJ-SPT |
2014-03-28 14:45 |
Okinawa |
Meio Univiersity |
Supporting Effect Assessment of Accessing Malicious Web Sites with Multi-Environment Analysis Takayuki Yoshinori, Akihito Shinoda (Nagoya Inst. of Tech), Masaki Kamizono (NICT), Masanori Hirotomo (Saga Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.), Akira Iwata (Nagoya Inst. of Tech) ICSS2013-85 |
It is not always true that enough information can be got by just using website analysis services, because some malicious... [more] |
ICSS2013-85 pp.161-166 |
LOIS |
2014-03-08 14:25 |
Okinawa |
|
Risk Assessment of Information Leak in Twitter Use of Employee
-- Tweet Experience and Consciousness about Business -- Yoshiaki Seki, Naoko Chiba (NTT), Yoshiaki Hashimoto (Univ. of Tokyo) LOIS2013-75 |
Companies are apprehensive about the information leak according to the handiness of Twitter. In this paper, we conduct W... [more] |
LOIS2013-75 pp.125-130 |
LOIS |
2014-03-08 14:50 |
Okinawa |
|
Risk Assessment of Information Leak in Twitter Use of Employee
-- The Actual Situation and Effectiveness of Company's Measures for Employee Tweets -- Naoko Chiba, Yoshiaki Seki (NTT), Yoshiaki Hashimoto (Univ. of Tokyo) LOIS2013-76 |
The cases, such as the employees posting to Twitter about customer information of the celebrity and the unpublished info... [more] |
LOIS2013-76 pp.131-136 |
R |
2013-10-18 15:50 |
Fukuoka |
|
Long-Term Change of "Time of Wetness" in Japan Masahiro Sotoma, Takashi Sawada (NTT) R2013-69 |
The existence of liquid on a metallic surface is a significant factor for the corrosion. Time of wetness (TOW) is specif... [more] |
R2013-69 pp.31-36 |
SSS |
2013-07-25 10:40 |
Tokyo |
|
On the Risk-Event Frequency and Risk-Event Rate Yoshinobu Sato (JACO), Masahiko Takeichi (DNV) SSS2013-7 |
This paper, firstly, defines a risk event as a change of the state of an overall system from a risk-state into the state... [more] |
SSS2013-7 pp.1-4 |
SSS |
2013-07-25 13:00 |
Tokyo |
|
Study on Usability of Supporting Protective Device for Integrated Manufacturing System Takabumi Fukuda, Masaya Norikane (NUT) SSS2013-9 |
Integrated Manufacturing System (IMS) has been used widely. ISO 11161 is provided for IMS, which tell us to assess the ... [more] |
SSS2013-9 pp.9-12 |
R |
2013-05-17 14:50 |
Hiroshima |
|
Probability Distribution Parameters Based on Meteorologocal Data in Japan for Calculating the Time of Wetness Masahiro Sotoma, Takashi Sawada (NTT) R2013-10 |
The existence of liquid on a metallic surface is a significant factor for the corrosion. Time of wetness (TOW) is specif... [more] |
R2013-10 pp.55-60 |
SC |
2013-03-15 13:40 |
Tokyo |
|
Towards Provenance-Based Security Risk Assessment Guillermo Horacio Ramirez Caceres, Yohei Murakami, Koji Zettsu, Takeshi Takahashi, Shin'ichiro Matsuo (NICT) |
We are developing a Knowledge Language Grid (KLG) system, which enables users to combine multiple assets data from diffe... [more] |
SC2012-18 pp.7-12 |
EMD, R |
2013-02-15 15:05 |
Mie |
Sumitomo Wiring System, Ltd |
Probability Distributions of Annual Average Temperature and Relative Humidity for the Time of Wetness in Japan Masahiro Sotoma, Takashi Sawada (NTT) R2012-75 EMD2012-106 |
The existence of liquid on a metallic surface is a significant factor for the corrosion. Time of wetness (TOW) is specif... [more] |
R2012-75 EMD2012-106 pp.17-22 |
SANE |
2013-01-25 14:55 |
Nagasaki |
Nagasaki Prefectural Art Museum |
Safety Assessment of RVSM Operation by Estimating Lateral Overlap Probability for Each Route Osamu Amai (ENRI) SANE2012-146 |
The Reduced Vertical Separation Minimum (RVSM) has been implemented in Japanese domestic airspace since September 2005. ... [more] |
SANE2012-146 pp.115-120 |
SSS |
2012-12-20 13:00 |
Kyoto |
|
Safety of Food Processing Machine
-- On Safety of Newly Developed High-Pressure Food Processer in Niigata-JST Project -- Takabumi Fukuda (Nagaoka Univ. Tech.), Jumpei Fujii (NICO), Hirotaka Itoh (Nagaoka Univ. Tech.) SSS2012-22 |
High pressurizing process is available for some kinds of food to add new value on them. However, high pressure processin... [more] |
SSS2012-22 pp.1-4 |
R |
2012-10-19 14:20 |
Fukuoka |
|
Comparison of Deterioration Rates of Steel Poles Masahiro Sotoma, Takashi Sawada (NTT) R2012-56 |
In the making of the deterioration rate of facilities, maintenance data is useful for reflecting the real environment. H... [more] |
R2012-56 pp.13-16 |
SSS |
2012-07-26 14:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Weighting of a risk element to be used for the estimate of a hygiene risk Hiroyuki Omura (FOOMA), Takabumi Fukuda (NUT) SSS2012-7 |
A "hygienic hazard" does not bring health damage to consumers, but there are a lot of non-conforming products which give... [more] |
SSS2012-7 pp.9-12 |
SSS |
2011-12-22 15:10 |
Tokyo |
|
Risk comparison between electrical home appliances, and other products
-- The application of the R-Map method, and FTA method -- Kenichi Sakai (NITE) SSS2011-21 |
(To be available after the conference date) [more] |
SSS2011-21 pp.13-16 |
ICM, LOIS |
2011-01-21 13:30 |
Nagasaki |
|
A Multi-Platform Vulnerability Management System Based on the Standard Protocol and Public Contents Akihito Nakamura (AIST) ICM2010-51 LOIS2010-62 |
Continuous vulnerability management is one of critical and effective controls to block security attacks. However, the ad... [more] |
ICM2010-51 LOIS2010-62 pp.105-110 |
ICSS |
2010-11-05 14:30 |
Hiroshima |
Hiroshima City University |
Network Topology Analysys for Web Malware Risk Assesment Akira Kanaoka (Univ. of Tsukuba), Masahiko Kato (IIJ), Eiji Okamoto (Univ. of Tsukuba) ICSS2010-50 |
Risk Condition Reference Model indicated by National Information Security Center (NISC) simulated dynamics of threat beh... [more] |
ICSS2010-50 pp.35-40 |
SSS |
2009-08-24 13:00 |
Osaka |
|
A study for suited risk-assessmennt method of labor accident for the small and medium enterprise Motoya Takagi (jniosh) SSS2009-12 |
The objective of this research is to advance risk assessment and develop practicality of such assessment in order to red... [more] |
SSS2009-12 pp.1-4 |